Target from: CTF Playground
2: Flags (2:app
)
1: Service
1,010 pts
Avg. headshot: 4,215 minutes
1: Flags found
1: Service discovered
310 pts
Welcome to Pling, this misconfiguration is so common that it has a name starting with off-by something something. By exploiting this vulnerability you will be able to access files far outside your reach as a normal user.
To start the challenge visit the page at http://10.0.14.26:1337/ and try to follow the instructions. Your timer starts from the first time you connect to the service.
38 Headshots (newer first)
katto, alamillo, echoOne, Sid110307, karpik, Atlantica, doofyr, Byt3P4ss, poggiesai, hazy, cavca2012, DamianPellejero, Pablo977, jaxafed, antonioban, 4rl4dn4, uApocryphon, noother, B13ss3d
AskTaimoor, No0ne, Clientname, Tr1s, Sev7en, D1ie3z, srrequiem, bas1c, vicky5, ddr4ramm, PufferOverflow, Grosik, r0b0tG4nG, Pegasus, sirEgghead, biba22, g0rchy, hitmanalharbi, mpz